Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.

Slides:



Advertisements
Similar presentations
Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Advertisements

The Data Protection (Jersey) Law 2005.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Duncan Woodhouse – Assistant Registrar for Information Security, Risk Management and Business Continuity Helen Wollerton – Administrative Officer (Legal.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
3 Is there something I should know? Exercising our rights.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
Administrative Practices Outcome 1
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
General Purpose Packages
Handling information 14 Standard.
Health & Social Care Apprenticeships & Diploma
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
The Data Protection Act 1998 The Eight Principles.
Pass ECDL41 European Computer Driving Licence Module 1 – Concepts of IT Chapter 1.6 – Legal Issues and Security.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act 171 Computers and privacy There are problems as more computers are used There are problems as more computers are used More and more.
Investigating Rights and Responsibilities at work
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
The Data Protection Act [1998]
What is personal data? Personal data is data about an individual which they consider to be private.
The Data Protection Act - Confidentiality and Associated Problems.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
Data Protection Act (1998).
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Security of, privacy of and access to personal/confidential information/data.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
ICT & Crime The Data Protection Act. Objectives Understand the need for the DPA Be able to describe the provisions of the DPA, the exceptions to the DPA.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
Data Protection GCSE ICT Mrs N Steventon-2005.
Handling Personal Data
Legislation in ICT.
Data Protection Act.
Data Protection Act.
The Data Protection Act 1998
Anonymised information
Legislation in ICT.
Communicating in the IT Industry
Handling information 14 Standard.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Computer Laws Data Protection Act 1998 Computer Misuse Act 1990

Learning Objectives List the measures that must be taken in order to protect against hacking (physical and software) and viruses. Explain the need for data protection legislation and to protect confidentiality of Data. Explain how this can be addressed.

Why do we need data protection legislation? Many organisations store large amounts of personal information about people on their computer systems. This may be data on customers, employees, suppliers, competitors, etc. This may be data on customers, employees, suppliers, competitors, etc. The increasing trend to store vast quantities of such data has worried many people.

Concerns Who will be able to access this data? Will information about me be available over the Internet, and therefore vulnerable to hackers? Can my records be sold on to someone else? Is the data accurate? If it is stored, processed and transmitted by computer, who will check that it is accurate? Will data about me be stored even if it is not needed?

In order to address these concerns, the Data Protection Act (1998) was passed.

Data Protection Act 1998 Data must be obtained and processed lawfully. Data must be obtained and specified for lawful purposes. Data stored must be relevant. Data stored must be kept accurate and up to date. Data stored must be kept no longer than necessary. Data must be processed within the data subject's rights. Data must be kept secure. Data must not be transferred to countries that do not have suitable data protection laws.

Personal data should be obtained and processed fairly and lawfully. This means that you should be told that data is being collected about you, and you should know what the data will be used for.

Personal data can be held only for specified and lawful purposes. The Data Controller has to state why they want to collect and store information when they apply for permission to be able to do so. If they use the data they have collected for other purposes, they are breaking the law.

Personal data should be adequate, relevant and not excessive for the required purpose. Organisations should only collect the data that they need and no more. Your school needs to know your parent's phone number in case they need to contact them in an emergency. However, they do not need to know what your grandmother's name is, nor do they need to know your eye colour. They should not ask, nor should they store such details since this would be excessive and would not be required to help with your education.

The personal data should be accurate and kept up-to-date. Companies should do their best to make sure that they do not record the wrong facts about a data subject. Your school probably asks your parents to check a form once a year to make sure that the phone number and address on the school system is still correct. If a person asks for the information to be changed, the company should comply if it can be proved that the information is indeed incorrect.

The personal data should not be kept for longer than is necessary for the purpose for which it is collected. Organisations should only keep personal data for a reasonable length of time. Hospitals might need to keep patient records for 25 years or more, that is acceptable since they may need that information to treat an illness later on. However, there is no need for a personnel department to keep the application forms of unsuccessful job applicants.

Data must be processed in accordance with the rights of the data subjects. People have the right to inspect the information held on them (except in certain circumstance - see later). If the data being held on them is incorrect, they have the right to have it changed.

Appropriate security measures must be taken against unauthorised access. This means information has to be kept safe from hackers and employees who don't have rights to see it. Data must also be safeguarded against accidental loss.

Personal data cannot be transferred to countries outside the European Union unless the country provides an adequate level of protection. This means that if a company wishes to share data with an organisation in a different country, that country must have similar laws to our Data Protection Act in place.

Exemptions National Security CrimeTaxation Heath, Education and Social Work Personal data about the physical or mental health of the data subject. Personal data about the physical or mental health of the data subject. Personal data being processed by government departments or local authorities which is being used in the course of any investigation or monitoring. being processed by government departments or local authorities which is being used in the course of any investigation or monitoring. That could form part of a confidential reference (application for employment or a college course etc) That could form part of a confidential reference (application for employment or a college course etc)

Computer Misuse Act 1990 This law was devised to reduce the activity of hackers, with these 3 main points: It is illegal to access unauthorised data. It is illegal to access unauthorised data. It is illegal to access unauthorised data and intend to do it again. It is illegal to access unauthorised data and intend to do it again. It is illegal to access unauthorised data and amend it. It is illegal to access unauthorised data and amend it.

How to protect against Hacking Physical methods: Keeping important computers in locked rooms. Keeping important computers in locked rooms. Posting security guards. Posting security guards. Security locks, smart cards. Security locks, smart cards. Keeping sensitive data on stand-alone machines instead of networks. Keeping sensitive data on stand-alone machines instead of networks. Using alarm systems and video cameras Using alarm systems and video cameras Software methods: Data encryption data is 'scrambled' before being transmitted through a network. Only the authorised recipient has the 'key'. Firewalls - software to block access from outside. Activity logs, passwords and levels of security.

Plenary What measures must be taken in order to protect against hacking (physical and software)?

How to protect against Hacking Physical methods: Keeping important computers in locked rooms. Keeping important computers in locked rooms. Posting security guards. Posting security guards. Security locks, smart cards. Security locks, smart cards. Keeping sensitive data on stand-alone machines instead of networks. Keeping sensitive data on stand-alone machines instead of networks. Using alarm systems and video cameras Using alarm systems and video cameras Software methods: Data encryption data is 'scrambled' before being transmitted through a network. Only the authorised recipient has the 'key'. Firewalls - software to block access from outside. Activity logs, passwords and levels of security.

Plenary Why do we need data protection legislation and protect confidentiality of Data? Concerns: Who will be able to access this data? Will information about me be available over the Internet, and therefore vulnerable to hackers? Can my records be sold on to someone else? Is the data accurate? If it is stored, processed and transmitted by computer, who will check that it is accurate? Will data about me be stored even if it is not needed?

Plenary How did the government address these concerns? It brought out the Data Protection Act 1998.